Displaying 20 results from an estimated 120 matches similar to: "[PATCH] ia64 build fixes"
2005 Sep 05
2
[PATCH][1/6] add a hypercall number for virtual device in unmodified guest
add a hypercall number for virtual device in unmodified guest
There are 6 patches for para-driver support in vmx guest. This is the
first one.
Signed-off-by: Xiaofeng Ling <xiaofeng.ling@intel.com>
Signed-off-by: Arun Sharma <arun.sharma@intel.com>
diff -r 287d36b46fa3 xen/arch/x86/x86_32/entry.S
--- a/xen/arch/x86/x86_32/entry.S Tue Aug 30 20:36:49 2005
+++
2008 Oct 07
6
A race condition introduced by changeset 15175: Re-init hypercall stubs page after HVM save/restore
For an SMP Linux HVM guest with PV drivers inserted, when we do save/restore (or LiveMigration) for the guest, it might panic after it''s restored.
The panic point is inside ap_suspend():
....
while (info->do_spin) {
cpu_relax();
read_lock(&suspend_lock);
HYPERVISOR_yield(); ----> guest might panic on the invocation of this function.
2012 Feb 13
0
[PATCH 05/14] arm: implement exception and hypercall entries.
arm: implement exception and hypercall entries.
xen/arch/arm/xen/Makefile | 3 +
xen/arch/arm/xen/asm-offsets.c | 61 ++++++++
xen/arch/arm/xen/entry.S | 596 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
xen/arch/arm/xen/hypercalls.S | 67 +++++++++
xen/arch/arm/xen/physdev.c | 41 +++++
5 files changed, 768 insertions(+), 0
2006 Aug 25
1
[PATCH][RFC]xenperf hypercall pretty print TAKE 2
This patch pretty prints the hypercall section for
$xenperf -f
Each hypercall count is tagged by its name.
Reference:
http://lists.xensource.com/archives/html/xen-ia64-devel/2006-08/msg00261.html
Signed-off-by Ken Hironaka <kenny@logos.ic.i.u-tokyo.ac.jp>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2008 Mar 07
6
where is the location of definition of "do_xen_version"?
hi, my friends:
Currently, i am studying the way of hypercall's implementation.
i have already known the flow of hypercall's execuation, and i decided to add a new hypercall into the Xen.
first, i want to know the detail of one hypercall function, for example, "do_xen_version", but i can not find
the location of definition of "do_xen_version". who can help me?
i have
2006 Sep 20
3
Bug#388352: xen-hypervisor-3.0-unstable-1-amd64: veth0 is missing
Package: xen-hypervisor-3.0-unstable-1-amd64
Version: 3.0-unstable+hg11292-2
Severity: important
My server is a dell 2950 server.
Before the dom0 rebooting bug ocurred, xen was well even for hvm domU.
By now i have tried xen-hypervisor-3.0-amd64 (3.0.2+hg9697-2) and
xen-hypervisor-3.0-unstable-1-amd64 (3.0-unstable+hg11292-2),
but both of them are unusable for me.
for
2008 Mar 18
7
A question related with symbol reference?
hi, my friends:
recently, i am reading the source codes about hypercall.
First, i study a simple hypercall, for example, the "do_xen_version".
In "xen-3.1.0-src\xen\common\kernel.c", the definition of "do_xen_version" is:
DO(xen_version) (int cmd, XEN_GUEST_HANDLE(void) arg)
{
....
}
according to the " #define DO(fn) long do_##fn ", the expanded form is
2007 Apr 18
0
[PATCH 3/5] XEN: Update ELF notes to xen-head.S to the new interface
Again pretty self explanatory. Should be merged into 024-head.patch
Signed-off-by: Ian Campbell <ian.campbell@xensource.com>
diff -r bc6940cd08ed arch/i386/paravirt-xen/xen-head.S
--- a/arch/i386/paravirt-xen/xen-head.S Wed Aug 23 15:12:48 2006 +0100
+++ b/arch/i386/paravirt-xen/xen-head.S Wed Aug 23 15:14:47 2006 +0100
@@ -2,6 +2,7 @@
place in head.S */
#include
2012 Feb 25
9
[xen-unstable bisection] complete test-amd64-i386-rhel6hvm-amd
branch xen-unstable
xen branch xen-unstable
job test-amd64-i386-rhel6hvm-amd
test redhat-install
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/jeremy/xen.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: qemuu git://xenbits.xen.org/staging/qemu-upstream-unstable.git
Tree: xen http://xenbits.xen.org/staging/xen-unstable.hg
*** Found and reproduced problem
2013 Jan 19
21
[PATCH]: PVH: specify xen features strings cleany for PVH
On Thu, 17 Jan 2013 22:22:47 -0500
Konrad Rzeszutek Wilk <konrad.wilk@oracle.com> wrote:
> Jan had some comments about that patch:
>
> https://patchwork.kernel.org/patch/1745041/
>
> Please fix it up so I can put it in the Linux tree.
Please see below.
Signed-off-by: Mukesh Rathor <mukesh.rathor@oracle.com>
Thanks,
Mukesh
diff --git a/arch/x86/xen/xen-head.S
2006 Jan 26
2
do_* declarations (was: Re: [Xen-ia64-devel] [PATCH] added multicall)
Hi,
on ia64, the do_* functions for hypercalls are called in C. However, they are
not declared in any .h file. I think it is cleaner to declare them in an
header file rather than locally. The question is in which header file.
Thank you for any suggestion.
The do_* functions are at least:
extern long do_ni_hypercall(void);
extern long do_dom0_op(dom0_op_t *u_dom0_op);
extern long
2012 Sep 04
2
[PATCH] valgrind: Support for ioctls used by Xen toolstack processes.
Please CC as I''m not subscribed to valgrind-developers.
Under Xen the toolstack is responsible for managing the domains in
the system, e.g. creating, destroying, and otherwise manipulating
them.
To do this it uses a number of ioctls on the /proc/xen/privcmd
device. Most of these (the MMAPBATCH ones) simply set things up such
that a subsequenct mmap call will map the desired guest
2006 Aug 29
10
mini-os: gnttab.c does not compile
Hello,
sorry to bother you with this: while trying to compile mini-os from
xen-unstable.hg, I noticed that compilation failed like this:
gcc -fno-builtin -Wall -Werror -Wredundant-decls -Wno-format
-Wstrict-prototypes -Wnested-externs -Wpointer-arith -Winline -m32
-march=i686 -g -Iinclude -Iinclude/x86 -Iinclude/x86/x86_32 -c gnttab.c
-o gnttab.o
gnttab.c: In Funktion »init_gnttab«:
2017 May 04
3
Bug#861660: Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"):
> On Thu, May 04, 2017 at 05:06:07PM +0100, Ian Jackson wrote:
> > I have fixed these in stretch but the jessie package remains unfixed.
> > I think I may be able to find some backports somewhere. Would that be
> > useful ? Is anyone else working on this ?
>
>
2013 Jun 12
26
Interesting observation with network event notification and batching
Hi all
I''m hacking on a netback trying to identify whether TLB flushes causes
heavy performance penalty on Tx path. The hack is quite nasty (you would
not want to know, trust me).
Basically what is doesn''t is, 1) alter network protocol to pass along
mfns instead of grant references, 2) when the backend sees a new mfn,
map it RO and cache it in its own address space.
With this
2005 Feb 23
19
Calculating real cpu usage of Xen domains correctly!
Hi all,
With the new vm-tools we are trying to get top like capabilities going
correctly. Currently we have a program vm-list that has some of this
capability but is dependent on the cpu time given by libxc calls
(xc_get_dom_info & xc_domain_get_cpu_usage). These two functions give
you how much time (in nanoseconds, why is this not documented) the
domain has been actively used. Approaches:
2006 Dec 01
0
[PATCH 3/10] Add support for netfront/netback acceleration drivers
This set of patches adds the support for acceleration plugins to the
netfront/netback drivers. These plugins are intended to support
virtualisable network hardware that can be directly accessed from the
guest, bypassing dom0.
This is in response to the RFC we posted to xen-devel with an outline
of our approach at the end of September.
To follow will be another set of patches to provide our
2017 May 04
4
Xen package security updates for jessie 4.4, XSA-213, XSA-214
Moritz Muehlenhoff writes ("Re: Xen package security updates for jessie 4.4, XSA-213, XSA-214"):
> Yes, the distribution line should be jessie-security, but please send
> a debdiff to team at security.debian.org for a quick review before
> uploading (I have no idea whether dgit supports security-master).
Here is the proposed debdiff (actually, a git diff) for xen in jessie.
My
2013 Nov 14
33
VCPUOP_set_periodic_timer
Hi all,
I need a periodic timer running at ideally at 125 microseconds and at
least 500 microseconds. I''ve just found the VCPUOP_set_periodic_timer,
however there is a comment saying "periods less than one millisecond may
not be supported".
I will be running on an x64 machine. Is this supported? If not, is there
any alternate means of generating a fast interrupt?
Regards.
2006 Apr 13
0
RE: hypercall_page
Hypercall_page is actually a code page, which contains 32 hypercall entry. every entry is something like
"mov $__HYPERVISOR_xxx,%eax
int $0x82 "
It is initialized in hypercall_page_initialise(void *hypercall_page) at the time when control panel creates the domain. Later, domain can simply the corresponding entry to issue a hypercall.
For the subroutine of the HYPERVISOR_xxx,